Chapter 10. Using Digital Signatures
THE FOLLOWING CCNA-SECURITY EXAM TOPICS ARE COVERED IN THIS CHAPTER:
Hashing overview
Explain hash function and values
Explain hashing algorithms
Explain digital signatures
Once you have an understanding of hashing and its components, we will discuss digital signatures. We will look at the features that make up digital signatures and the algorithms that generate them.
Hashing Overview
What is hashing? Simply put, hashing is taking some type of input data and generating some sort of value. This value is typically a fixed-length integer. The process of taking input data and generating the value is called a hash function ...
Get CCNA® Security Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.